For its tests, NSS Labs used a Web server to attempt to infect its test PCs, but only using known exploits which have been seen on the Internet and in circulation for months, if not years. In other words, testers employed no zero-day vulnerabilities. In addition, the firm studied how different browsers reacted to the various exploits, using all versions of Internet Explorer since IE6, multiple versions of Firefox, as well as Apple Safari, and Google Chrome.

On that front, researchers issued a stark security warning--to consumers, but also applicable to businesses--that anyone still using IE6 "must be technically knowledgeable enough to employ other defenses, or will almost certainly be compromised." That's because when using IE6, only the McAfee endpoint security product blocked 100% of drive-by-download attacks, delivered via either HTTP or HTTPS. While four other products also performed well, Microsoft's wasn't one of them. "Ironically, Microsoft Security Essentials was one of the poorest performers at protecting users of IE6, and failed to block any of the Office 2003 exploits when delivered via Internet Explorer 6," according to the report.

Of course, security experts always recommend that businesses employ layered information security defenses, and not rely solely on antivirus software to block threats. According to NSS Labs, those extra layers of business defense should include, at a minimum, a robust patch management program, including rapid upgrading to the latest browser versions and browser plug-ins, as well as the use of an intrusion prevention system (IPS), especially in businesses that allow--explicitly or otherwise--employees to connect their own devices to the corporate network, per the bring-your-own-device (BYOD) movement.

While the report focuses on consumer-grade antivirus software, it's important to note that most endpoint security vendors' consumer-grade suites include a more sophisticated array of exploit-blocking tools than their enterprise-grade software. That's due in part to the industry assumption that for many consumers, the only defense standing between their PC and a malware infection is the antivirus software. Furthermore, those defenses are facing an ever-increasing number of threats, as the reported number of new vulnerabilities has been increasing by about 30% per year. Even one exploit that slips past the security defenses could result in an infection, allowing attackers to install additional malware onto the PC, or add the PC to their botnet.

I am a user / reseller of GFI Vipre which is not listed. I occasionally service infected units. The most frequently used of the AV products on infected units are listed in the higher area of your effectiveness list. Go figure...

Those percentages do not seem good at all, and actually this very alarming considering how many people use end point as protection tool. What I think is even more alarming than the actual high percentages is that these are known exploits! If I was a a Antivirus company at the very least I would be able to block and catch the known exploits!

Having built an antivirus product from scratch, I am not surprised. That is why the new company I started specializes in end-user security awareness training, because the bad guys bypass the antivirus and social engineer the user to click on a link or open a malicious attachment. http://www.knowbe4.com/

Published: 2015-03-03Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

Published: 2015-03-03** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none.

How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.